New Model for Selling Holistic Smartphone Security

Security channel providers who help customers approach smartphone protection in a holistic fashion could grab hold of a significant market niche if they approach it the right way, says an industry analyst at Compliance Research Group, which today released a new model for implementing mobile security in the enterprise. Meant to aid channel partners, vendors […]

Sep 17, 2009
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Security channel providers who help customers approach smartphone protection
in a holistic fashion could grab hold of a significant market niche if they
approach it the right way, says an industry analyst at Compliance Research
Group, which today released a
new model for implementing mobile security in the enterprise
.

Meant to aid channel partners, vendors and enterprises in navigating the chaos
caused by massive user migration to highly functional computing devices such as
iPods and BlackBerry devices, CRG’s DUST model suggests that the mobile
environment cannot be fully secured without protecting four major elements:
devices, users, sessions and transactions.

“We developed the DUST model primarily because in our view there wasn’t a
practical, simple and easy-to-understand way for all of the different pieces to
fit together,” says said Mark Willoughby, principal and lead analyst at CRG.
“The jigsaw puzzle was disconnected, and there wasn’t a practical way for
either vendors or end users or channel partners and channel providers to
understand all of the pieces needed to fit together to have a complete
end-to-end solution for the emerging smartphone mobile marketplace.”

Willoughby sees the DUST model
starting at the basics with sound device security to protect against viruses,
man-in-the-middle attacks and device losses. Then organizations need to secure
the individual user activity through strong authentication. Next, session risks
associated with transit through VPNs and various portals into the cloud or
trusted network applications must be mitigated. And finally, organizations must
account for the security of transactions once the user has reached the
destination site.

“So the DUST model is a new way of viewing a complex end-to-end chain of trust
from the user through the device through the sessions through the destination
and the transaction to be conducted there," Willoughby
says.

He believes the biggest challenge today in mobile security is bridging the
security divide between consumer applications and enterprise applications that
must co-exist on the same device.

“On that same device, leaping over [from consumer applications], we have to VPN
to some secure corporate Websites in a trusted network in the cloud that
contains a lot of sensitive information,” he says. “Being able to do that
properly is going to be a big challenge.”

As enterprises try to meet those challenges, Willoughby
believes that there is a tremendous amount of opportunity for the channel to
swoop in and fill in holes within the smartphone chain of trust left behind by
a fragmented vendor landscape.

“Very few people are able to fully provide that kind of end-to-end security. Even
mobile carriers can’t provide that kind of capability for their smartphone
devices,” he says. “For aggressive and visionary channel partners, they can
quickly grab something like the DUST model to start using that to design and
market and sell pieces of the solution to fill in the gaps.”

Recommended for you...

Frank Vitagliano on GTDC Research & Future of Platforms

GTDC CEO Frank Vitagliano shares insights on vendor onboarding, distribution’s evolving role, and platforms shaping the IT channel’s future.

Cloudbrink Adds Native ID Management, Crowdstrike Integration

Cloudbrink expands Personal SASE with identity services and Crowdstrike integration, unifying user and device security for zero-trust access control.

Jordan Smith
Aug 5, 2025
Cleo Intros New Capability to EDI Managed Services Solution

Cleo adds AI-driven error categorization to its TM&M managed services, boosting supply chain efficiency with automated resolution and faster insights.

Jordan Smith
Aug 4, 2025
Guardrails for AI Agents: Noma Secures $100M Boost

Noma Security raises $100M Series B to help enterprises govern and secure autonomous AI agents as demand for agent oversight rapidly accelerates.

Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.